Method and apparatus for securing software to reduce unauthorized use
DC CAFCFirst Claim
1. A method for securing software to reduce unauthorized use of the software, the method comprising:
- associating a series of passwords with the software for each authorized user prior to distribution of the software,requiring entry of a first password upon first use of the software; and
subsequently requiring entry of another password to continue using the software.
1 Assignment
Litigations
0 Petitions
Accused Products
Abstract
A method and apparatus for securing software to reduce unauthorized use include associating a password or series of passwords with each copy of group of authorized software and requiring entry of a first password obtained from the developer or authorized representative of the software after exchanging registration information. The method and apparatus may also subsequently require entry of a second password from the series associated with the software to continue using the software. A password or authorization code series may be associated with each authorized copy or with a group of copies such as those distributed to a particular organization or site. Preferably, subsequent passwords or authorization codes are obtained from an authorized software developer, manufacturer, or distributor which gathers current information from the user to monitor compliance with licensing restrictions. The number and frequency of required password updates may be regular or irregular depending upon the application, user, or software manufacturer. A code which disables the software may be communicated if the manufacturer determines that the user is an unauthorized user.
483 Citations
45 Claims
-
1. A method for securing software to reduce unauthorized use of the software, the method comprising:
-
associating a series of passwords with the software for each authorized user prior to distribution of the software, requiring entry of a first password upon first use of the software; and subsequently requiring entry of another password to continue using the software. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method of securing software comprising:
-
disabling operation of the software until a password in obtained; enabling operation of the software for a predetermined interval after the password is obtained; and repeatedly requiring a new password for continued operation of the software beyond expiration of the predetermined interval wherein the new password is determined using a previous password.
-
-
8. A method for securing software to reduce unauthorized use of the software, the method comprising:
-
requiring entry of a first password upon first use of the software; subsequently requiring entry of another password to continue using the software; and repeating the step of subsequently requiring entry of another password at scheduled intervals for continued operation of the software.
-
-
9. A method for securing software to reduce unauthorized use of the software, the method comprising:
-
requiring entry of a first password upon first use of the software; subsequently requiring entry of another password to continue using the software; and repeating the step of subsequently requiring entry of another password at regular intervals.
-
-
10. A method of securing software to reduce unauthorized use, the method comprising:
-
associating a series of passwords with the software; requiring an end user to contact a representative to obtain a password previously associated with the software; communicating a password previously associated with the software to the software, wherein the software is not functional until the password has been communicated; and subsequently requiring a new password, the new password being obtained from the series of passwords previously associated with the software. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A method of securing software to reduce unauthorized use, the method comprising:
-
requiring an end user to contact a representative to obtain a password previously associated with the software; communicating a password previously associated with the software to the software, wherein the software is not functional until the password has been communicated; periodically requiring registration information associated with the end user to obtain a new password, the new password being required for continued operation of the software.
-
-
24. A method of securing software to reduce unauthorized use, the method comprising:
-
requiring a password for the software to become operational; repeatedly requiring registration information associated with the end user to obtain a new password, the new password being required for continued operation of the software; and comparing the registration information with previously obtained registration information associated with the software to determine whether the end user is an authorized user.
-
-
25. A method comprising:
-
requiring an authorization code for software to become operational; repeatedly requiring registration information to obtain a new authorization code for continued operation of the software; comparing the registration information with previously obtained registration information; and providing a new authorization code only if at least a portion of the registration information matches previously obtained registration information.
-
-
26. A method comprising:
-
disabling software from being functional until a first authorization code is entered; repeatedly requiring a new authorization code after expiration of each of a plurality of varying intervals for continued operation of the software, the new authorization code being obtained from the representative.
-
-
27. A method of securing software comprising:
-
associating a plurality of passwords with the software, at lease one password being generated prior to the distribution of the software; enabling operation of the software after a password has been entered; periodically requiring a new password for continued operation of the software, the new password being obtained after providing registration information associated with a user; comparing the registration information with previously obtained registration information; providing a new password which allows continued operation of the software if the step of comparing indicates the end user is an authorized user; and providing a new password which disables the software if the step of comparing indicates the end user is an unauthorized user.
-
-
28. A computer readable storage medium having data stored therein representing software executable by a computer, the software including instructions to reduce use of the software by unauthorized users, the storage medium comprising:
-
instructions for requiring an end user to obtain a password associated with the software; instructions for disabling the software until the password has been communicated to the software; and instructions for repeatedly requiring communication of a new password for continued operation of the software. - View Dependent Claims (29)
-
-
30. A computer readable storage medium having data stored therein representing software executable by a computer, the software including instructions to reduce use of the software by unauthorized users, the storage medium comprising:
-
instructions for requiring an end user to contact an authorized representative to obtain a password associated with the software; instructions for disabling the software until the password has been communicated to the software; and instructions for periodically requiring entry of a new password for continued operation of the software.
-
-
31. A computer readable storage medium having data stored therein representing software executable by a computer, the software including instructions to reduce use of the software by unauthorized users, the storage medium comprising:
-
instructions for requiring a password associated with the software; instructions for enabling the software after the password has been communicated to the software; and instructions for disabling the software after a predetermined password is communicated to the software.
-
-
32. A computer readable storage medium having data stored therein representing software executable by a computer, the software including instructions to reduce use of the software by unauthorized users, the storage medium comprising:
-
instructions for requiring a password associated with the software; instructions for enabling the software after the password has been communicated to the software; instructions for subsequently requiring a new password to be communicated to the software for continued operation of the software; and instructions for automatically contacting an authorized representative of the software to communicate registration information and obtaining authorization for continued operation of the software.
-
-
33. A computer readable storage medium having data stored therein representing software executable by a computer, the software including instructions to reduce use of the software by unauthorized users, the storage medium comprising:
-
instructions for requiring an end user to contact an authorized representative to obtain a password associated with the software; instructions for disabling the software until the password has been communicated to the software; instructions for periodically requiring entry of a new password for continued operation of the software; instructions for automatically contacting an authorized representative of the software to communicate registration information and obtaining authorization for continued operation of the software; and instructions for encoding the registration information.
-
-
34. A method of securing software to reduce use of the software by unauthorized users, the method comprising:
-
associating a series of passwords with each unit of software; requiring communication of registration information to an authorized representative for the software to receive a first password from the series of passwords associated with the software, the registration information being associated with an end user of the software; periodically repeating the step of requiring communication of registration information to the authorized representative to obtain a subsequent password from the series of passwords for continued operation of the software, each password enabling operation of the software for a predetermined interval.
-
-
35. A method of securing software to reduce unauthorized use of the software, the method comprising requiring periodic communication of registration information associated with a user of the software to a remotely located password administrator to obtain a password which enables continued operation of the software wherein the password is determined based on a previously obtained password.
-
36. A method for reducing unauthorized use of software, the method comprising:
-
requiring an end user to contact an authorized representative of the software upon initial use of the software by the end user to obtain an authorization code; communicating registration information associated with the end user to the authorized representative; and providing an authorization code which disables the software if the registration information indicates that the end user is an unauthorized user.
-
-
37. A method for reducing unauthorized use of software, the method comprising:
-
requiring registration information to be entered during initial use of the software; communicating the registration information to an authorized representative of the software; determining whether the software has been previously registered; if the software has been previously registered, determining whether the registration information matches at least a portion of the previous registration information; communicating an authorization code to the software upon receiving the registration information if the software has not been previously registered or if the registration information matches at least a portion of the previous registration information, the authorization code allowing continued operation of the software for a first predetermined period; after the first predetermined period has expired, requiring a subsequent authorization code for continued operation of the software, the subsequent authorization code being communicated only if registration information indicates the end user is an authorized user based on previously received registration information.
-
-
38. A method of securing software to reduce unauthorized use, the method comprising:
-
Associating a plurality of passwords with the software and distributing one of the plurality of passwords concurrently with the software; repeatedly requiring an end user to contact a representative to obtain another one of the passwords previously associated with the software; and communicating one of the passwords previously associated with the software to the software, wherein the software remains functional only until the password expires. - View Dependent Claims (39, 40, 41)
-
-
42. A method of securing software to reduce unauthorized use, the method comprising:
-
associating a plurality of passwords with the software and distributing one of the plurality of passwords concurrently with the software; requiring an end user to obtain another one of the passwords previously associated with the software; communicating one of the passwords previously associated with the software to the software; and periodically requiring a new password for continued operation of the software, the new password being obtaining from an authorized representative.
-
-
43. A method comprising:
-
requiring a password to enable operation of software for a predetermined interval; disabling the software upon expiration of the predetermined interval; periodically requiring a new password for continued operation of the software, the new password being obtained from an authorized representative after providing registration information associated with the end user; comparing the registration information with previously obtained registration information; providing a new password which allows continued operation of the software if the step of comparing indicates the end user is an authorized user; and providing a new password which disables the software if the step of comparing indicates the end user is an unauthorized user.
-
-
44. A method of securing software to reduce unauthorized use, the method comprising:
-
associating a plurality of passwords with the software and distributing one of the passwords concurrently with the software; repeatedly requiring an end user to contact a representative to obtain another one of the passwords previously associated with the software; communicating one of the passwords previously associated with the software to the software, wherein the software remains functional only until the password expires; obtaining registration information associated with the end user as a precondition for performing the step of communicating the password; and modifying the password based on the registration information.
-
-
45. A method of securing software to reduce unauthorized use, the method comprising:
-
associating a plurality of passwords with the software and distributing one of the plurality of passwords concurrently with the software; repeatedly requiring an end user to contact a representative to obtain another one of the passwords previously associated with the software, the password being determined using a previous password; and communicating one of the passwords previously associated with the software to the software, wherein the software remains functional only until the password expires.
-
Specification